Vigil@nce - Junos Space: six vulnerabilities
December 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Junos Space.
Impacted products: Junos Space.
Severity: 2/4.
Creation date: 13/10/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Junos Space.
An attacker can bypass security features via Web Interface, in
order to escalate his privileges. [severity:2/4; CVE-2016-4926]
An attacker can act as a Man-in-the-Middle on SSH, in order to
read or write data in the session. [severity:2/4; CVE-2016-4927]
An attacker can trigger a Cross Site Request Forgery, in order to
force the victim to perform operations. [severity:2/4;
CVE-2016-4928]
An attacker can bypass security features, in order to escalate his
privileges. [severity:2/4; CVE-2016-4929]
An attacker can trigger a Cross Site Scripting, in order to run
JavaScript code in the context of the web site. [severity:2/4;
CVE-2016-4930]
An attacker can transmit malicious XML data, in order to read a
file, scan sites, or trigger a denial of service. [severity:2/4;
CVE-2016-4931]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Junos-Space-six-vulnerabilities-20854